CVE-2017-3136
Summary
| CVE | CVE-2017-3136 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-01-16 20:29:00 UTC |
| Updated | 2020-10-20 12:15:00 UTC |
| Description | A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8. |
Risk And Classification
Problem Types: CWE-617
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Application | Isc | Bind | 9.10.4 | p1 | All | All |
| Application | Isc | Bind | 9.10.4 | p2 | All | All |
| Application | Isc | Bind | 9.10.4 | p3 | All | All |
| Application | Isc | Bind | 9.10.4 | p4 | All | All |
| Application | Isc | Bind | 9.10.4 | p5 | All | All |
| Application | Isc | Bind | 9.10.4 | p6 | All | All |
| Application | Isc | Bind | 9.10.5 | b1 | All | All |
| Application | Isc | Bind | 9.10.5 | rc1 | All | All |
| Application | Isc | Bind | 9.11.0 | All | All | All |
| Application | Isc | Bind | 9.11.0 | p1 | All | All |
| Application | Isc | Bind | 9.11.0 | p2 | All | All |
| Application | Isc | Bind | 9.11.0 | p3 | All | All |
| Application | Isc | Bind | 9.11.1 | beta1 | All | All |
| Application | Isc | Bind | 9.11.1 | rc1 | All | All |
| Application | Isc | Bind | 9.8.0 | p1 | All | All |
| Application | Isc | Bind | 9.9.0 | p1 | All | All |
| Application | Isc | Bind | 9.9.0 | p2 | All | All |
| Application | Isc | Bind | 9.9.0 | p3 | All | All |
| Application | Isc | Bind | 9.9.0 | p4 | All | All |
| Application | Isc | Bind | 9.9.0 | p5 | All | All |
| Application | Isc | Bind | 9.9.0 | p6 | All | All |
| Application | Isc | Bind | 9.9.10 | beta1 | All | All |
| Application | Isc | Bind | 9.9.10 | rc1 | All | All |
| Application | Isc | Bind | 9.9.3 | All | All | All |
| Application | Isc | Bind | 9.9.3 | s1 | All | All |
| Application | Isc | Bind | 9.10.4 | p1 | All | All |
| Application | Isc | Bind | 9.10.4 | p2 | All | All |
| Application | Isc | Bind | 9.10.4 | p3 | All | All |
| Application | Isc | Bind | 9.10.4 | p4 | All | All |
| Application | Isc | Bind | 9.10.4 | p5 | All | All |
| Application | Isc | Bind | 9.10.4 | p6 | All | All |
| Application | Isc | Bind | 9.10.5 | b1 | All | All |
| Application | Isc | Bind | 9.10.5 | rc1 | All | All |
| Application | Isc | Bind | 9.11.0 | All | All | All |
| Application | Isc | Bind | 9.11.0 | p1 | All | All |
| Application | Isc | Bind | 9.11.0 | p2 | All | All |
| Application | Isc | Bind | 9.11.0 | p3 | All | All |
| Application | Isc | Bind | 9.11.1 | beta1 | All | All |
| Application | Isc | Bind | 9.11.1 | rc1 | All | All |
| Application | Isc | Bind | 9.8.0 | p1 | All | All |
| Application | Isc | Bind | 9.9.0 | p1 | All | All |
| Application | Isc | Bind | 9.9.0 | p2 | All | All |
| Application | Isc | Bind | 9.9.0 | p3 | All | All |
| Application | Isc | Bind | 9.9.0 | p4 | All | All |
| Application | Isc | Bind | 9.9.0 | p5 | All | All |
| Application | Isc | Bind | 9.9.0 | p6 | All | All |
| Application | Isc | Bind | 9.9.10 | beta1 | All | All |
| Application | Isc | Bind | 9.9.10 | rc1 | All | All |
| Application | Isc | Bind | 9.9.3 | All | All | All |
| Application | Isc | Bind | 9.9.3 | s1 | All | All |
| Application | Isc | Bind | All | All | All | All |
| Application | Isc | Bind | All | All | All | All |
| Application | Isc | Bind | All | All | All | All |
| Application | Netapp | Data Ontap Edge | - | All | All | All |
| Application | Netapp | Data Ontap Edge | - | All | All | All |
| Application | Netapp | Element Software | - | All | All | All |
| Application | Netapp | Element Software | - | All | All | All |
| Application | Netapp | Oncommand Balance | - | All | All | All |
| Application | Netapp | Oncommand Balance | - | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Aus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.4 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.5 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Eus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.3 | All | All | All |
| Operating System | Redhat | Enterprise Linux Server Tus | 7.6 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Workstation | 7.0 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2020:1699-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3854-1 bind9 | DEBIAN | www.debian.org | Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| April 2017 ISC BIND Vulnerabilities in NetApp Products | NetApp Product Security | CONFIRM | security.netapp.com | Third Party Advisory |
| Document Display | HPE Support Center | CONFIRM | h20566.www2.hpe.com | Third Party Advisory |
| CVE-2017-3136: An error handling synthesized records could cause an assertion failure when using DNS64 with "break-dnssec yes;" - Security Advisories | CONFIRM | kb.isc.org | Vendor Advisory |
| BIND DNS64 State Error Lets Remote Users Cause the Target Service to Crash - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2020:1701-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| BIND: Multiple vulnerabilities (GLSA 201708-01) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory |
| ISC BIND CVE-2017-3136 Remote Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: ISC would like to thank Oleg Gorokhov of Yandex for making us aware of this vulnerability.
Legacy QID Mappings
- 378290 Virtuozzo Linux Security Update for bind-pkcs11-libs (VZLSA-2017:1095)
- 378311 Virtuozzo Linux Security Update for bind-chroot (VZLSA-2017:1105)
- 500048 Alpine Linux Security Update for bind
- 503729 Alpine Linux Security Update for bind
- 710473 Gentoo Linux BIND Multiple Vulnerabilities (GLSA 201708-01)